Catch Me If You Can: The Changing Faces of Malware

2018-11-14T08:03:56+00:00November 14th, 2018|Threats|

The reappearance of malware variants shows how platform criminality is enabling hackers to teach old code new tricks The security industry and authorities need to work together to understand how platforms are being used to resurrect malware New malware is constantly emerging into the ever-growing threat landscape, and the diversity and number of attacks that [...]

How Hackers Exploit Online Games

2018-10-29T16:46:16+00:00October 31st, 2018|Threats|

Legitimate platforms like online gaming services are a breeding ground for hackers, with in-game currencies and micro-transactions putting a target on the gaming industry’s back Online games have also provided a testing ground for hackers keen to test their malware on unsuspecting players Hackers taking advantage of social networks like LinkedIn is nothing new in [...]

Bromium Announces Capture the Flag BYOM Challenge

2018-10-29T17:37:36+00:00October 29th, 2018|BYOM|

Bromium is announcing a Capture the Flag Bring Your Own Malware (BYOM) competition To win a $30,000 cash prize, you have to submit a sample of malware that successfully breaks out from our hardware-enforced containment and gains access to the flag file For details, rules, and submission instructions, visit www.bromium.com/byom This week, Bromium announced a [...]

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

2018-07-20T17:47:52+00:00July 19th, 2018|Threats|

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing proliferation of “fileless malware” — malware that uses trusted programs in sinister ways, instead of delivering the usual malicious payloads — and find [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16+00:00February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

Bromium Honored for Excellence in Government Cybersecurity

2018-01-09T14:21:37+00:00January 9th, 2018|Company News, Government|

We have a successful track record protecting federal government customers from known and unknown attacks Leading government security awards program recognizes Bromium’s continued commitment to the public sector Bromium provides defense-grade protection, allowing government employees to work as usual On January 8th, we received exciting news that we won two Government Security News Homeland Security [...]

Easily Isolate Downloads and Executables So Threats Can’t Escape [video]

2018-01-03T13:38:40+00:00January 3rd, 2018|Threats|

Safely download any file from the web or a shared link, even if it is malicious Eliminate restrictive IT security policies that limit user access to downloaded files and inhibit workflows Automatically verify the integrity of downloaded files without involving the Helpdesk Most knowledge-workers are on the internet all day long, mixing business and personal [...]

Email Attachments (Even the Bad Ones) Can’t Bypass Application Isolation [video]

2018-01-02T06:05:31+00:00January 2nd, 2018|Threats|

Safely open any email attachment from Outlook or web mail, even if it contains malware Eliminate restrictive IT security policies that limit access to email attachments Improve user productivity by removing the risk of opening malicious email attachments Email attachments drive cybersecurity experts nuts. Despite advancements in malware detection, malicious email attachments are still getting [...]

Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected

2017-12-20T16:04:44+00:00December 20th, 2017|Threats|

Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close